So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
Show this thread
-
Replying to @marcan42
At least for the U2F / Webauthn function, I think most services are equally pwned whether the key is duplicated, or just used to authenticate once while under the control of the attacker.
1 reply 0 retweets 2 likes
Replying to @enginetankard
Yeah, for U2F without a PIN protecting the key, it doesn't really matter much. I'll happily take an open key based on a jellybean micro for *just* U2F. Things get more interesting for PGP/SSH use with a PIN protecting the key material.
1:53 AM - 12 Mar 2020
0 replies
0 retweets
2 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.